Question No: 41

Which design enables easy and flexible scaling in the Cisco Enterprise Architecture model?

modular

top-down

bottom-up

full-mesh

Answer: A

Question No: 42 DRAG DROP

Drag the term on the left to the matching deployment scenario on the right.

Answer:

Question No: 43

Which mode is used to exclusively look for unauthorized access points?

monitor mode

sniffer mode

rogue detector mode

local mode

Answer: C

Question No: 44

Which option is a benefit of Cisco Discovery Protocol?

provides information about directly connected Cisco devices

provides greater detail about collected data, including time stamping

part of the IEEE 802 1ab standard

combines with the network layer data that is gathered by NetFlow when using a NetFlow collector

Answer: A

Explanation: Cisco Discovery Protocol (formerly known as CDP) is a Layer 2, media- independent, and network-independent protocol that runs on Cisco devices and enables networking applications to learn about directly connected devices nearby. This protocol facilitates the management of Cisco devices by discovering these devices, determining how they are configured, and allowing systems using different network-layer protocols to learn about each other.

Question No: 45

Which two options should be used to achieve fast convergence in an OSPF network? (Choose two.)

Bidirectional Forwarding Detection

fast hellos

LSA retransmission interval

SPF throttle timers

LSA group pacing

Answer: A,B

Question No: 46

Which four services does the architecture for Media Services contain? (Choose four.)

access services

transport services

storage services

forwarding services

session control services

security services

filtering services

remote access services

Answer: A,B,C,E Explanation:

An architecture framework for media services supports different models of video models. As shown in Figure 14-13, the network provides service to video media in the Media Services Framework. Those services are access services, transport services, bridging services, storage servers, and session control services, which arc provided to endpoints. Access services provide identity of end devices, mobility, and location services.